首页> 外文会议>LATIN'98: Theoretical informatics >Strength of Two Data Encryption Standard Implementational udner Timing Attacks
【24h】

Strength of Two Data Encryption Standard Implementational udner Timing Attacks

机译:定时攻击下两种数据加密标准实施的优势

获取原文
获取原文并翻译 | 示例

摘要

We study the vulnerability of several implementations of the Data encryption standard crytosystem under a timing attack. A timing attack is a method designed to break cryptographic systems that was recently proposed by Paul kocher. It exploits the engineering aspects involved in the impelmentation of cryptosystems and might succeed even against cryptosystems that remain impervious to sophisticated cryptanalytic tehniques. A timing attack is, essentially, a way fo obtaining some user's private information by carefully measuring the time it takes the user to carry out cryptographic operations. In this work we analyze two implementations of DES. We show that a timing attack yields the Hamming weight ofthe key used by both DES implementations. Moreover, the attack is computationally inexpersive. We also show that all the design characteristics of the target system, necessary to carry out the timing attack, can be inferred from timing measurements. To the best of our knowledge this work is the first one that shows that symmetric cryptosystems are vulnerable to timign attacks.
机译:我们研究了定时攻击下数据加密标准crytosystem的几种实现的脆弱性。定时攻击是Paul Kocher最近提出的一种旨在破解密码系统的方法。它利用了实现加密系统所涉及的工程学方面,甚至可以对抗那些仍然无法被复杂的加密分析技术所渗透的加密系统。从本质上讲,定时攻击是一种通过仔细测量用户执行密码操作所花费的时间来获取某些用户的私人信息的方法。在这项工作中,我们分析了DES的两种实现。我们证明定时攻击产生了两个DES实现所使用的密钥的汉明权重。而且,该攻击在计算上是不昂贵的。我们还表明,可以从时序测量中推断出进行时序攻击所需的目标系统的所有设计特征。据我们所知,这项工作是第一个表明对称密码系统易受时间攻击的工作。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号